Fraud Detection and Control System in Bank Using Finger Print Simulation
Keywords:
Fraud, Fingerprint, ATM, SecurityAbstract
The need to control access to certain information and resources has been taken seriously nowadays due to fraud and other threats to current security systems. The role of ATM in promoting, developing and expanding the concept of “Anytime Anywhere Anyplace” banking is undeniable. It offers a real convenience to those who are on the run in their everyday life, but at the same time, it also carries a big element of risk. This paper believes that no single method, algorithm, key or procedure is entirely secure. Hence a combination of multiple security components is mandatory to provide a high level of protection against fraud and other threats. This research is about enhancing the security feature of an ATM by fingerprint verification and the use of confirmation message. It looks into the vulnerabilities of ATM cards, Personal Identification numbers (PIN) or passwords which are widely used in systems today. As a result, the aim of the research is to propose a framework for user identification and authentication in automated teller machines (ATM) as opposed to PIN. This robust method of user identification and authentication would hopefully reduce the vulnerabilities of ATM in the future. The programming language was chosen for its ideal nature for writing windows based application.
References
- Adeloye, L.A. (2008). E-Banking as new frontiers for banks. Sunday Punch, September 14, P. 25
- Adepoju A. & Alhassan, G. (2010). Challenges of Automated Teller Machine (ATM) in Nigeria. Journal of Internet Banking and commerce (JIBC), 15(2), 2-10
- Amurthy P.k. & Reddy M.S. (2012); Implementation of ATM security by using fingerprint recognition and GSM (global system for mobile communication). International journal of electronics communication and computer engineering vol. 3 no1, Pp:83-86. Retrieved from: http://buy.cuna.org/download/diebold_fingerprintpaper.pdf
- Anita K. Pennathur. (2001). Clicks and Bricks: E-Risk Management for Banks in the age of the Internet. Journal of Banking and Finance, 2103-2123 http://dx.doi.org/10.1016/S0378-4266(01)00197-2
- Chinedu N. O., Chima B. O., & Emeka E. I. (2012). Analysis of the Negative Effects of the Automated Teller Machine (ATM) as a Channel for Delivering Banking Services in Nigeria. International Journal of Business and Management,7(7),180-190. Retrieved from http://ccsenet.org/journal/index.php/ijbm/article/view/16034
- Chris E. M. (2006). Bank ATM Security Advice: Effective Method of Security Measures. Virtual Banking. Journal of Internet Banking and Commerce, 11(1) (http://www.arraydev.com/commerce/jibc/)
- Computer Crime Research Center. (2009). Preventive Measures for ATM frauds. http://www.crimeresearch.org/articles/preventive measures-ATM Fraud, (Retrieved 29th March, 2015).
- Das, S. & Debbarma, J. (2011). Designing a biometric strategy (fingerprint measure for enhancing ATM security in India e-Banking system. International Journal of Information and Communication Technology Research Vol. 1 No 5 p 197-203.
- Devinaga R. (2010). ATM Risk Management and Controls. European Journal of Economics, Finance and Administrative Sciences, 21, 161-171. Retrieved from www.eurojournals.com/ejefas_21_13.pdf
- Diebold Corporation, (2012). ATM Fraud and Security (2012).:White Paper, New York Retrieved from www.diebold.com: Accessed September, 12, 2015.
- ICMR. (2007). Report on Global ATM Fraud-2007. Retrieved from www.icmrindia.org/casestudies/catalogue/Business%20Reports/BREP041.htm, accessed July 2015.
- Obiano W. (2009). How to fight ATM Fraud. online Nigeria Daily News, June 21, P. 18 accessed 2015
- Ozten, S. & Kargin, S. (2012) Importance of internal control system in banking sector. p. 133, www.Icbr-archives.com/..../13fec27.pdf
Try to solve the new Formula Cube! It works exactly like a Rubik's Cube but it is only $2, from China. Learn to solve it with the tutorial on rubiksplace.com or use the solver to calculate the solution in a few steps. (Please subscribe for a membership to stop adding promotional messages to the documents)
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.